Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
From MaRDI portal
Publication:3092350
DOI10.1007/978-3-642-24316-5_8zbMath1298.94083OpenAlexW165895243MaRDI QIDQ3092350
Zhenfeng Zhang, Cheng Chen, Dengguo Feng
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_8
Related Items (9)
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Cites Work
- Unnamed Item
- Efficient hybrid encryption from ID-based encryption
- Decentralizing Attribute-Based Encryption
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Bounded Ciphertext Policy Attribute Based Encryption
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Multi-authority Attribute Based Encryption
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Asymmetric Group Key Agreement
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost